Movatterモバイル変換


[0]ホーム

URL:


US20190147194A1 - Synchronized hardware-based security for a communication system - Google Patents

Synchronized hardware-based security for a communication system
Download PDF

Info

Publication number
US20190147194A1
US20190147194A1US16/195,219US201816195219AUS2019147194A1US 20190147194 A1US20190147194 A1US 20190147194A1US 201816195219 AUS201816195219 AUS 201816195219AUS 2019147194 A1US2019147194 A1US 2019147194A1
Authority
US
United States
Prior art keywords
security
security module
network
information
packet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US16/195,219
Inventor
Steven Charles Price, JR.
Weston Raymond Alameida
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Oblivion Labs Inc
Original Assignee
Oblivion Labs Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oblivion Labs IncfiledCriticalOblivion Labs Inc
Priority to US16/195,219priorityCriticalpatent/US20190147194A1/en
Publication of US20190147194A1publicationCriticalpatent/US20190147194A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

An improved apparatus, method and computer-readable storage medium are provided for implementing a secured communication system via synchronized hardware-based security. The present disclosure thus includes, without limitation, various example implementations directed toward secured data transmission reliant on hardware-based encryption and/or decryption methods. The secured communication system may provide secure real-time communications over networks, such as, but not limited, to computer networks, even when the networks being used are inherently insecure.

Description

Claims (1)

What is claimed is:
1. An apparatus comprising:
a housing enclosing one or more integrated circuits comprising:
a memory configured to store a pre-configured state of the one or more integrated circuits, the pre-configured state being identical to the pre-configured state of another apparatus with which the apparatus is paired; and
one or more processor cores configured to access the memory and execute a cipher in accordance with the pre-configured state; and
a first communication interface and a second communication interface each of which is physically coupled to the housing and communicatively coupled to the one or more integrated circuits,
wherein the first communication interface is communicatively coupleable to a first network node, the second communication interface is communicatively coupleable to an insecure network between the first network node and a second network node to which the other apparatus is communicatively coupleable, and the one or more processor cores are configured to execute the cipher to implement a security service for data carried by the insecure network between the first network node and second network node.
US16/195,2192015-08-172018-11-19Synchronized hardware-based security for a communication systemAbandonedUS20190147194A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US16/195,219US20190147194A1 (en)2015-08-172018-11-19Synchronized hardware-based security for a communication system

Applications Claiming Priority (4)

Application NumberPriority DateFiling DateTitle
US201562205957P2015-08-172015-08-17
US15/239,380US20170052907A1 (en)2015-08-172016-08-17Synchronized hardware-based security for a communication system
US15/928,149US20180211068A1 (en)2015-08-172018-03-22Synchronized hardware-based security for a communication system
US16/195,219US20190147194A1 (en)2015-08-172018-11-19Synchronized hardware-based security for a communication system

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US15/928,149ContinuationUS20180211068A1 (en)2015-08-172018-03-22Synchronized hardware-based security for a communication system

Publications (1)

Publication NumberPublication Date
US20190147194A1true US20190147194A1 (en)2019-05-16

Family

ID=58157541

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US15/239,380AbandonedUS20170052907A1 (en)2015-08-172016-08-17Synchronized hardware-based security for a communication system
US15/928,149AbandonedUS20180211068A1 (en)2015-08-172018-03-22Synchronized hardware-based security for a communication system
US16/195,219AbandonedUS20190147194A1 (en)2015-08-172018-11-19Synchronized hardware-based security for a communication system

Family Applications Before (2)

Application NumberTitlePriority DateFiling Date
US15/239,380AbandonedUS20170052907A1 (en)2015-08-172016-08-17Synchronized hardware-based security for a communication system
US15/928,149AbandonedUS20180211068A1 (en)2015-08-172018-03-22Synchronized hardware-based security for a communication system

Country Status (1)

CountryLink
US (3)US20170052907A1 (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10467890B2 (en)*2016-05-132019-11-05Microsoft Technology Licensing, LlcSecured sensor interface
US10313123B1 (en)2016-12-142019-06-04Amazon Technologies, Inc.Synchronizable hardware security module
US10263778B1 (en)*2016-12-142019-04-16Amazon Technologies, Inc.Synchronizable hardware security module
US10425225B1 (en)2016-12-142019-09-24Amazon Technologies, Inc.Synchronizable hardware security module
US10742408B2 (en)*2017-02-272020-08-11Cord3 Innovation Inc.Many-to-many symmetric cryptographic system and method
US10691837B1 (en)*2017-06-022020-06-23Apple Inc.Multi-user storage volume encryption via secure enclave
EP3785409B1 (en)2018-04-252023-08-02British Telecommunications public limited companyData message sharing
US11411726B2 (en)2018-05-242022-08-09British Telecommunications Public Limited CompanyCryptographic key generation using multiple random sources
US11451387B2 (en)*2018-05-242022-09-20British Telecommunications Public Limited CompanyCryptographic key generation and storage
EP3584734A1 (en)*2018-06-192019-12-25Siemens AktiengesellschaftHardware security module
US11599649B2 (en)*2020-06-292023-03-07Rockwell Automation Technologies, Inc.Method and apparatus for managing transmission of secure data packets
US11606346B2 (en)2020-06-292023-03-14Rockwell Automation Technologies, Inc.Method and apparatus for managing reception of secure data packets
US12381716B2 (en)*2021-12-302025-08-05Arris Enterprises LlcOptimized key management for data signing systems

Citations (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6316976B1 (en)*1998-05-202001-11-13Micron Technology, Inc.Method and apparatus for improving the performance of digital delay locked loop circuits
US20020174489A1 (en)*1999-03-112002-11-28Puig Ramon BrucartCorkscrew
US20030014627A1 (en)*1999-07-082003-01-16Broadcom CorporationDistributed processing in a cryptography acceleration chip
US20030231473A1 (en)*2002-06-122003-12-18Canon Kabushiki KaishaPrinted wiring board for controlling signal transmission using paired inductance and capacitance
US20050086497A1 (en)*2003-10-152005-04-21Keisuke NakayamaIC card system
US20060005921A1 (en)*2002-02-202006-01-12Lee Sang SApparatus and method for manufacturing liquid crystal display devices, method for using the apparatus, and device produced by the method
US7514780B2 (en)*2006-03-152009-04-07Hitachi, Ltd.Power semiconductor device
US20100262262A1 (en)*2009-04-082010-10-14Sanyo Electric Co., Ltd.Contents Recording System, Contents Recording Control Method, and Recording Medium Having Contents Recording Control Program Recorded Thereon
US20110286596A1 (en)*2009-01-292011-11-24Fortress Applications Ltd.System and methods for encryption with authentication integrity
US8140925B2 (en)*2007-06-262012-03-20International Business Machines CorporationMethod and apparatus to debug an integrated circuit chip via synchronous clock stop and scan

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6316976B1 (en)*1998-05-202001-11-13Micron Technology, Inc.Method and apparatus for improving the performance of digital delay locked loop circuits
US20020174489A1 (en)*1999-03-112002-11-28Puig Ramon BrucartCorkscrew
US20030014627A1 (en)*1999-07-082003-01-16Broadcom CorporationDistributed processing in a cryptography acceleration chip
US20060005921A1 (en)*2002-02-202006-01-12Lee Sang SApparatus and method for manufacturing liquid crystal display devices, method for using the apparatus, and device produced by the method
US20030231473A1 (en)*2002-06-122003-12-18Canon Kabushiki KaishaPrinted wiring board for controlling signal transmission using paired inductance and capacitance
US20050086497A1 (en)*2003-10-152005-04-21Keisuke NakayamaIC card system
US7514780B2 (en)*2006-03-152009-04-07Hitachi, Ltd.Power semiconductor device
US8140925B2 (en)*2007-06-262012-03-20International Business Machines CorporationMethod and apparatus to debug an integrated circuit chip via synchronous clock stop and scan
US20110286596A1 (en)*2009-01-292011-11-24Fortress Applications Ltd.System and methods for encryption with authentication integrity
US20100262262A1 (en)*2009-04-082010-10-14Sanyo Electric Co., Ltd.Contents Recording System, Contents Recording Control Method, and Recording Medium Having Contents Recording Control Program Recorded Thereon

Also Published As

Publication numberPublication date
US20170052907A1 (en)2017-02-23
US20180211068A1 (en)2018-07-26

Similar Documents

PublicationPublication DateTitle
US20190147194A1 (en)Synchronized hardware-based security for a communication system
US12192184B2 (en)Secure session resumption using post-quantum cryptography
CN102804677B (en)Discovery of secure network enclaves
RU2552166C2 (en)Method and device for call-reply authentication
KR101834504B1 (en)Apparatus and method for encrypting and decrypting
JP2012050066A (en)Secure field-programmable gate array (fpga) architecture
US20190036689A1 (en)Establishing shared key data for wireless pairing
KR20180119201A (en)Electronic device for authentication system
US11362990B1 (en)Reassigning exit internet protocol addresses in a virtual private network server
US11838274B1 (en)Parallel tunneling with virtual private network servers
US20240080302A1 (en)Clustering of Virtual Private Network Servers
US12206648B2 (en)Optimized utilization of internet protocol addresses in a virtual private network
Won et al.A secure shuffling mechanism for white-box attack-resistant unmanned vehicles
US12432042B2 (en)Network traffic obfuscation
US20250260667A1 (en)Secure connections between servers in a virtual private network
US11943201B2 (en)Authentication procedure in a virtual private network
KR101785382B1 (en)Method for authenticating client, operation method of client, server enabling the method, and communication software enabling the operation method
US12184614B2 (en)Performance-based parallel tunneling of virtual private network servers
KR101810165B1 (en)Electronic money terminal and method for providing elecronic money using the same
US20250007718A1 (en)Endpoint validation security
Rasmussen et al.Nearby threats: Reversing, analyzing, and attacking Google’s ‘nearby connections’ on Android

Legal Events

DateCodeTitleDescription
STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp